A Case-Based Approach to Anomaly Intrusion Detection